• 제목/요약/키워드: Threat Integration

검색결과 55건 처리시간 0.019초

이기종 다중센서 위협데이터 통합 및 대응책 선정 알고리즘 (Algorithm for Threat Data Integration of Multiple Sensor and selection of CounterMeasures)

  • 고은경;우상민;정운섭
    • 한국군사과학기술학회지
    • /
    • 제14권3호
    • /
    • pp.474-481
    • /
    • 2011
  • The Electronic Warfare Computer for the Aircraft Survivability Equipment will improve the ability for countermeasures by analysis about threat information. This paper suggests method that threat data integration of multiple sensors(Radar Warning Receiver, Laser Warning Receiver, Missile Warning Receiver). The algorithm of threat data integration is based on detected threat sequence and azimuth information. The threat sequence information is analyzed in advance and the azimuth data is received from sensors. The suggested method is evaluated through simulation under the environment like real helicopter.

생존체계 위협조우 상황인지를 위한 복합/다중 위협상황 Emulation 연구 (A Study on Complex Threat Emulation for Situation Awareness of ASE System)

  • 이문석;이정원
    • 한국정보통신학회논문지
    • /
    • 제14권10호
    • /
    • pp.2180-2186
    • /
    • 2010
  • 무기체계의 현대화 및 복잡화에 따라 현대전 상황에서의 플랫폼 및 운용자에 대한 생존성 확보를 필요로 하게 되었다. 현대 전장의 복합 및 다중 위협상황 무기체계에 대응하기 위하여 다수의 무기체계 플랫폼에서 생존체계를 함께 탑재하게 된다. 생존체계는 무기체계 플랫폼을 위협하는 위협들을 탐지/식별하며 효율적인 대응을 통하여 운용자로 하여금 정확한 상황인지를 가능하게 하고 플랫폼의 생존 능력을 향상시킨다. 생존체계가 보유하여야 할 중요 성능 인자는 복합 및 다중 위협에 대한 처리를 통하여 생존성을 확보하는 것이다. 이에 본 논문에서는 레이다, 레이저, 미사일 단일 위협상황을 조합한 복합 위협상황을 다룸으로 하여 생존체계가 보유하여야 하는 위협통합 알고리즘을 제시하고, 복합 위협상황을 Emulation하는 시스템을 실험실 환경에서 구현하여 위협통합 알고리즘에 대한 성능을 검증하였다. 이를 통해 생존체계가 플랫폼 탑재 이전에 성능 및 신뢰성을 확보할 수 있는 방안에 대하여 제시한다.

UAM 통신, 항법, 감시 및 정보 시스템의 사이버 위협 분석 (Cyber Threat Analysis of UAM Communications, Navigation, Surveillance and Information System)

  • 김경욱;윤형근
    • 한국항행학회논문지
    • /
    • 제28권4호
    • /
    • pp.442-449
    • /
    • 2024
  • 본 연구는 도심항공교통(UAM; urban air mobility) 혹은 미래항공교통(AAM; advanced air mobility) 인프라의 통신, 항법, 감시 및 정보 시스템 인프라에 대한 사이버 위협 분석을 위한 포괄적인 프레임워크를 제안하고자 한다. 잠재적인 취약점과 위협 벡터를 검토함으로써 UAM 인프라의 보안과 회복력을 강화하려고 한다. 또한, 다양한 유형의 사이버 위협을 식별하고 분류하며, 이들 위협이 CNSi 시스템에 미치는 영향을 평가하고, 이러한 위협으로 악용될 수 있는 시스템 내의 취약점을 평가하는 상세한 사이버 위협 분석을 수행하고자 한다. 해당 연구는 UAM 시스템의 배치 및 운영에 참여하는 이해관계자들에게 귀중한 통찰을 제공하고, 궁극적으로 도시 공중 교통의 안전하고 효율적인 통합에 기여하는 것을 목적으로 한다.

한반도 통일과 군사통합 (군사적 과제를 중심으로) (Unification of the Korean Peninsula and Military Integration Focusing on the Military Tasks)

  • 한관수
    • 융합보안논문지
    • /
    • 제15권7호
    • /
    • pp.125-134
    • /
    • 2015
  • 이 논문은 한반도 통일이 가시화되고 여건이 조성되어 남북한 군사통합을 추진하게 될 때 무엇을 준비하고 실행해야 하는가를 군사 과제를 중심으로 연구하는데 목적을 두었다. 현 상황에서 남북한 통일의 시기를 예단하기는 제한되나 군사적 폭력을 관리하는 군사통합은 평시부터 준비가 되어 있어야 한다. 만일 군사통합이 실패하면 통일 자체도 위태롭게 되기 때문에 실천적 측면에서 정교한 준비가 요구된다. 이 연구에서는 다음의 주제에 대한 해결방안을 제시하고자 한다. 한반도에 적합한 군사통합의 유형과 전제조건은 무엇인가? 남북한 군사통합 추진 시 군사적 과제는 무엇인가? 이 중 핵심과제와 중요과제는 무엇이고 실천적 측면에서 어떻게 준비되어야 하는가?

China's Contribution to Recent Convergence and Integration among the Asian Economies

  • Das, Dilip K.
    • East Asian Economic Review
    • /
    • 제17권1호
    • /
    • pp.55-79
    • /
    • 2013
  • The objective of this article is to explore the economic relationship between China and the surrounding dynamic Asian economies. It delves into China's influence over the Asian economies and whether this relationship is a market-led or de facto symbiosis. The three principal channels of regional integration analyzed in this article are trade, FDI and vertically integrated production networks. They are essentially based on the activities of the private-sector in these economies. China methodically expanded and deepened its economic ties with the regional neighbors. At the present juncture, China's integration with the surrounding Asia is deep. Another issue that this article explores is the so-called China "threat" or "fear" in Asia. It implies that China is crowding out exports of the other Asian economies in the world market place. Also, as China has become the most attractive FDI destination among the developing countries, it is apprehended that China is receiving FDI at the expense of the Asian economies. These concerns were examined by several empirical studies, and the inference is that they are exaggerated. This article concludes that the private-sector business activities in China and other rapidly growing Asian economies were (and are) instrumental in bringing together the production structures and real economies. The result is both convergence and integration among the dynamic Asian economies. Over the years China and its Asian neighbors has developed a close and symbiotic economic relationship and a de facto regional integration.

System Insecurity - Firewalls

  • Ryu, Youngtae
    • 한국정보시스템학회:학술대회논문집
    • /
    • 한국정보시스템학회 2000년도 춘계학술대회
    • /
    • pp.171-175
    • /
    • 2000
  • The firewall is normally an intermediate system between the secure internal networks and the less secure external networks. It is intended to keep corporate systems safe from intruders, hackers, and accidental entry into the corporate system. The primary types of firewalls are screening routers, proxy servers, and stateful inspectors. Encryption is another form of firewall protection which is being incorporated along with other firewall methods. Before choosing a firewall architecture, a company must have the right mind set about the threat. The future will see more integration of firewall technologies and the increased use of standards in the industry. It must also determine what are the possible consequences of a breach in security and then develop a system to counter the threat. Additionally, new firewall technologies will address the potential dangers associated with the use of Java applets and Active X-controls on the Internet.

  • PDF

Corruption as a Threat to Economic Security of the Country

  • Samiilenko, Halyna;Ivanova, Nataliia;Shaposhnykova, Iryna;Vasylchenko, Lidiia;Solomakha, Iryna;Povna, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.316-322
    • /
    • 2021
  • The problem of corruption and the spread of corruption crime today is not only one of the main social problems, but also an obstacle to the implementation of reforms in Ukraine. Given the complexity, scale and diversity of the impact of corruption, it is an undisputed threat to national security. At the state level, corruption threatens, firstly, state security as a result of its spread in public authorities and the combination of political and business spheres; secondly, in the domestic political sphere as a result of non-compliance and violation by officials of public authorities and local governments of the laws of Ukraine; thirdly, in the economic sphere as a result of the dominance of personal interests of civil servants over national ones; fourthly, in other spheres, namely, military, social, ecological, informational, foreign policy, etc. The origins of corruption are diverse and are formed not only in the country but also abroad. The current corruption threat is the result of the country's ineffective domestic and foreign anticorruption policies. Acceleration of the spread and manifestation of external corruption threats is associated with a number of unresolved foreign policy issues against the background of the development of globalization and integration processes, in particular: economic and financial dependence of the country on international financial institutions and organizations; as well as from foreign countries that pose a potential threat due to their ambitious plans to expand our country; unresolved issues regarding the international legal consolidation of borders, etc. It is noted that the current conditions for the development of state security, due to new challenges and threats, need to improve and implement new measures to prevent corruption as a negative impact of the main threats to national economic security. As a result of the study, the main measures to counter the main threats to the economic security of the state were identified.

A SHIPBOARD MULTISENSOR SOLUTION FOR THE DETECTON OF FAST MOVING SMALL SURFACE OBJECTS

  • Ko, Hanseok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1995년도 Proceedings of the Korea Automation Control Conference, 10th (KACC); Seoul, Korea; 23-25 Oct. 1995
    • /
    • pp.174-177
    • /
    • 1995
  • Detecting a small threat object either fast moving or floating on shallow water presents a formidable challenge to shipboard sensor systems, which must determine whether or not to launch defensive weapons in a timely manner. An integrated multisensor concept is envisioned wherein the combined use of active and passive sensor is employed for the detection of short duration targets in dense ocean surface clutter to maximize detection range. The objective is to develop multisensor integration techniques that operate on detection data prior to track formation while simultaneously fusing contacts to tracks. In the system concept, detections from a low grazing angle search radar render designations to a sensor-search infrared sensor for target classification which in turn designates an active electro-optical sensor for sector search and target verification.

  • PDF

국토안보 구현을 위한 기술 동향 연구 (A Study on the Technology Trends for Implementation of Homeland Security)

  • 정승희;한종욱;최용석;오창헌
    • 한국항행학회논문지
    • /
    • 제13권6호
    • /
    • pp.991-997
    • /
    • 2009
  • 세계 각국에서 개인 및 공공의 안전을 위하여 보다 강화된 국토안보 기술의 개발에 많은 투자를 하고 있으며, 우리의 경우 북한의 핵무기 개발을 둘러싼 국제적 긴장과 이로 인한 안보위협뿐만 아니라 최근 들어 문화재에 대한 화재 및 강력범죄의 증가 등으로 인해 국토안보의 중요성이 강화되고 있다. 그러므로 본 논문에서는 강화되는 추세인 안전을 위한 국토안보 구현을 위해 관련 기술의 개발동향을 분석하고 연구하였다. 국토안보에 활용되는 과학기술 중 주요 기술로는 집적기술, 통합기술, 협력기술, 분류기술, 지능기술, 마이닝기술로 분류할 수 있으며, 테러 위협이 존재하는 한 관련 산업의 성장 잠재력은 높은 편이다. 따라서 국내 관련 업체들이 모든 분야에서 단시간 내에 관련 기술의 경쟁력을 갖추기 위해서는 안보관련 기술의 적극적인 개발과 인력확보 및 지원이 요구된다.

  • PDF

Japanese Political Interviews: The Integration of Conversation Analysis and Facial Expression Analysis

  • Kinoshita, Ken
    • Asian Journal for Public Opinion Research
    • /
    • 제8권3호
    • /
    • pp.180-196
    • /
    • 2020
  • This paper considers Japanese political interviews to integrate conversation and facial expression analysis. The behaviors of political leaders will be disclosed by analyzing questions and responses by using the turn-taking system in conversation analysis. Additionally, audiences who cannot understand verbal expressions alone will understand the psychology of political leaders by analyzing their facial expressions. Integral analyses promote understanding of the types of facial and verbal expressions of politicians and their effect on public opinion. Politicians have unique techniques to convince people. If people do not know these techniques and ways of various expressions, they will become confused, and politics may fall into populism as a result. To avoid this, a complete understanding of verbal and non-verbal behaviors is needed. This paper presents two analyses. The first analysis is a qualitative analysis that deals with Prime Minister Shinzō Abe and shows that differences between words and happy facial expressions occur. That result indicates that Abe expresses disgusted facial expressions when faced with the same question from an interviewer. The second is a quantitative multiple regression analysis where the dependent variables are six facial expressions: happy, sad, angry, surprised, scared, and disgusted. The independent variable is when politicians have a threat to face. Political interviews that directly inform audiences are used as a tool by politicians. Those interviews play an important role in modelling public opinion. The audience watches political interviews, and these mold support to the party. Watching political interviews contributes to the decision to support the political party when they vote in a coming election.